Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
784b22381bdb29e430d94a2055b85068_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
784b22381bdb29e430d94a2055b85068_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
784b22381bdb29e430d94a2055b85068_JaffaCakes118.html
-
Size
7KB
-
MD5
784b22381bdb29e430d94a2055b85068
-
SHA1
a127a78a0b07bbd581a806742f372e8e89863e99
-
SHA256
c9ad69f55ecb0e535d5c5ffbaea476e915f80032dbc7908f608faf3c0f8a1546
-
SHA512
cced6926ae4150046b9654a7ddb1cefd2b7ed458f414e0e5c669cdcf3d02512e0ef1d4b476d38795bf8d3a5beaaa8424a66b8b2c568c4ac9c74942e6408a4f89
-
SSDEEP
96:uzVs+ux7AHLLY1k9o84d12ef7CSTUazf+Ch92UccEZ7ru7f:csz7AHAYS/0jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A912F81-4E59-11EF-BB5D-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428494930" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000262d60797aacc4cc326d4611429b51c30543737773ca539a845a4d227e9bc97c000000000e8000000002000020000000d5916dc73ae6bd779bc505ddfb05f7c50f34e4433cc9b20a63280d4256cf1e25200000008f6b48e41b82b493b651473c8916759b2b93426ecdfd721ae9fd13bd3261f437400000003a42d4fd4fed2ab1ad75da5f640787cb6852cf57bfa0cfce8eb514aba8979a6c026a4f11899da947736900456f5b89d07b67c37fe5548aa67701e6811ceeb69b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ea251166e2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2052 2316 iexplore.exe 30 PID 2316 wrote to memory of 2052 2316 iexplore.exe 30 PID 2316 wrote to memory of 2052 2316 iexplore.exe 30 PID 2316 wrote to memory of 2052 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\784b22381bdb29e430d94a2055b85068_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70bd2f2b807caabb93890f670273e52
SHA1351e18c65aea7108c6becd97b36459ad239a4d34
SHA2569d5ce8155234a39cfb770a8471f19047125280a774628ebe05c45ed58f186606
SHA5128ec44b50e83d6153834af7f4a103cd919d84cee8ba2a3e78e81656236e222a303317879a0b27c8d4c0894acca7d82b81d2d871a4a64c6388effbfc6889294991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cc4e353c627fbb8116f639acde0dfe
SHA186fe6f37faa6d7e0c87deb106b7943ac28795a1a
SHA2566678e91ee87dbddc5c756d08701c87b662a5e553d77f218a8c7045a281457b22
SHA512b2c7a3427545d037553c31aeffb0fc59d3cde41b20906672683cb804d397eb95a208a130cf7c18fa44bfaac71fe63142f5c95ec08aa4d801b0469fec841b9e90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553377fbd3be54aa5057f6352a27b42c6
SHA17317f648f210f85a624a92b0a309936ceac337b8
SHA2563f433403620e52b24d8e387916d8c4719c824c813746ad8d904991259df338aa
SHA512306cef520884904df88ee2ba0696a13a4e1f20d33f9fe5606d916e742fa4ecb50d493508bf2a105be5a0e65abab3e7d13a1407f4f545b4d5212865dc9bc3ee80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d35cc9592b8ef50693c8288410d1022
SHA1213c01110055472d7c3b04233198136ed0117c4d
SHA256b30d3c9fccb1ae223eb2d71b235ba003c6113fe6f1e847621a480f2425e1b015
SHA512590e6e1ed09759c75109f2e589dfe08a8679165257f049f4bd311de70016e0e3adf16376edd7e722ee55b02de49ed319917f9d315fa6360b924c9d20fedbc7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501e42639574b8f6e257aee9f6bf88a73
SHA1d069a4736aab40245ee43e08ef22b23b1aa33b90
SHA256f2a1d67bede1e99a728237552a49df9a7d1475e66714ce922bebc9c4fb17fd8b
SHA5128461c184fdc8ea9c31cc823afb92142b07be6150aa6b007e2b0332151f82d67420a22f244c0c796e2361301a0f8c64aa3d5b2fbe608e32e9baa97efa4263cc07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553683d746343c43410ca8a07ad06f121
SHA19cfed45e81856000e276b3dec2016f4e02f126da
SHA2563de2b71814de83ee8cf300363ca6308f144aaf63dea3324a2d0ff23b41cd9d87
SHA512974a5f50e594563e6478b4308f18f531846de41f0260fd767e7998e2d4fcdeee0c8a7e91bed470aff2ab8952066424e1dccf459d77b78c818341e6f2b44f8966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c22c6cfcd4f801c8245006d4c2c2540
SHA130bdedaf2f9a8c9f9a2d832ef5b6ee223097f3dc
SHA256de3bc681ec254e2e36d72c594af80bc140fb959c9d10520a6717c447fe3687d5
SHA512a0993e0e69395526aa163bdef6dd8969777b487ec38973d2658332aac67575448ec0fed3832aa4645870a6192ee61023f142d9edd8c9e91fa3e7ab72cdc605e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec199c152609b2c3d19c0d4a5bab1209
SHA16b2e4a9dcd1a08aa2ce3ccffa012900c7285eadc
SHA2565fce93e1eba89ad6b28314bbd89561797a57ae6dacb4e8a4b1ed9737c225d7f1
SHA51215fab4c35bf2d86fb071bf09bf9ae7c8edb8ebf7f9bffc6e7264f1a908b5f4a76fb08dab61474bd1fc69cdd7f498eecdc58d848226c31dfd998146c212287e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54776ed461838086ecd23b938f91c6fd3
SHA18761bad9f75bbec880271333d92c7b539357904a
SHA256ea1ab0ec86699de2b8ea0279d6dc57a1e776979ad3b3536f4713ace6bf1dfa83
SHA5120f85c8958caf9cbfcabb26f621a0cfdf4e2c803236c13700e6dc0b94351ddbf4104676d1d5a992effe1625daa818bfdd719b1981daa205b4ee348ec92977040f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547711d57133f4737b67a3e0900fab6a8
SHA15248dd30d7522cd6593509072e9919e180ab1eb9
SHA25621d170c02cb74111e84e5373edf6166a54445cb831bd3f03fdd9416f9a619e27
SHA512c61dbd8708f6560cbd0650ae3a6ce4e467b79e5b1135378d8c77ecc0d23a4ddd95035829c62a8aafd4556dc1f2ccf79a7baf22bdf749e30bd849e2d87f2ad744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b2efa8722da5457905979d897040fc
SHA18702f0e21e0e9a8bbbe16358b3b98781ded05aa3
SHA2567e98a70149d1fb840496c2825d959eba3bf107702a1961c7db62062e3663d729
SHA5129c2e3da528a296c7674fde6e04436780b698a035efb28c883fa0a9bc1078f333e75102e632cdafa196a8e19c5c142e6c410ed975d8629d96e9bdd7ae3ffa97ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb93cf122ffdae2343d6731d9e61503
SHA1f040142cc7cfb513fad6fd879926000ce541c4c8
SHA256e34b6536667c0d45236b7d12b3253bd557b4760cd99c5724ddfe1ebd41b3897d
SHA512c36f576abb99c059fe0b34572157d7363b41c70a66fd2c29215587e89fdd1349880954e632991d4d413813170cbd67c31b59eac0e7fbf4334072d32b7a25a5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72f397130e90fd3f644a4f8b03cee35
SHA182d990fec32ae97703a49360785044b8ebc78a69
SHA256992dbadb679e79fe5e9f6d35403119cd6300fb283716d96fdb1cbe34287abc27
SHA512daade2d232f1494127d0625da0c9cc4a277d930570fef4c2fa099ed6b7759d66318d54940d744922501a371046c3946eea08afc30a7a973f6dd7e35e15cce6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19573df421bf2562c55c7033a3cab63
SHA1995979d55358a6c7e90dcb37a076f641c1be3f4e
SHA25616475cfce7cec123e44495aa4b8c332a5ccf399604caf64281b7ae1f3760d915
SHA512dd5669620bce7039cecf5541c7445d650848219bc22bf58f63e54c00be60500e26a121d41f113c4ae578cd56905f04279bfe42d53381b7895058465dcee3b2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70c30ce59adf7fb31d8b052767a2d62
SHA19b8616106f5d42007f8f0a53714eb3186fb5bce5
SHA25682bccd0b2f25068a06ddcbe3f74f8483d917df2d2b20931f997c35a5dd66542a
SHA51208e01391932a31e592b8dad78e450d1c2c99ca5dcd1a045c340f1ed205ba8df89cdff2d8938e8d283036eafaa6844580f0e408c8ef4186d8e528980fe14e47b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ecd911dac1b2f96a8224b527a4a0fd9
SHA11f8309db563baab3fc1db30202964cce890f0bbe
SHA25668e337dab1f3407e052414e6b258642feb2ab5cc69cbce8c5f4f7b7f745c380c
SHA5126fc52e4b342b871c217682a6b56684b28258dd9ca0b491a95c7707b44b97058ef05e250d84016630e02a72b345cc3466813ec279b64d5aa9835f9780620357ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c608ef7c62ac33f656f97f37fd3870
SHA11b624751e5ee33f87a41a91267d46610511f1bae
SHA256aec6f38a817d5b5e5fd19c50531c8a012d7e02a564047b6153c257045dfca37f
SHA5121a04d62d3eb0b99af327964a36100c00acfdee7654b73092b3d07af786bf2d9b6866e89feefe0e2264c6b14daaedfb96855317024858e376b55831d16cf9a8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b9ecec36e46084e5280b1258e5c427
SHA19684b8297a4e4d90d3d8ccd34b4ec85a150df984
SHA256c0cdf7cbdac9b9fb90f3031ff566f7778578b5072ddfc836239362b8f3304006
SHA5123f87cbd5ccec1e37998e8d8952cecb5146fbd84b8417838d603d2b7ff0138ac52d1ebe4be586ba8fbe21712b64479b381b92335645814c25bf02deacecb6c345
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b